• 11 Posts
  • 154 Comments
Joined 2 years ago
cake
Cake day: July 4th, 2023

help-circle






  • Identity and access management ensures that the right people, machines, and software components get access to the right resources at the right time. First, the person, machine, or software component proves they’re who or what they claim to be. Then, the person, machine, or software component is allowed or denied access to or use of certain resources.

    So that’s what’s that called. Is that also what tracks who access what and when?